This is a quote of an article by Anthony Clark reproduced with permission

by Anthony Clark
(www.gainesville.com)

I read a interesting article by Anthony Clark, The Business Editor from http://www.gainesville.com/article/20100209/ARTICLES/2091002. The article is about a class action for damages following the potential loss of client data from some stolen laptops. I sent him an email and requested permission to quote it on this website. He owns the copyright. Here it is :



By Anthony Clark
Business editor


Published: Tuesday, February 9, 2010 at 6:01 a.m.
Last Modified: Monday, February 8, 2010 at 11:28 p.m.
( page all of 2 )

The theft of two company laptops from AvMed Health Plans' corporate offices in Gainesville might have compromised the personal information of more than 200,000 current and former subscribers, as well as their dependents, the company has announced.

The personal information includes names, addresses, phone numbers, Social Security numbers and protected health information. The random way the data was listed, however, makes the risk of identity theft very low, the company said.

The thefts were discovered on Dec. 11 at the corporate office at 4300 N.W. 89th Blvd.

A company security employee reported at 4:20 p.m. that day that two Dell laptops that had been locked in a conference room after staff left at 5 p.m. on Dec. 10 were missing. The employee said the door had remained locked during each security check and when staff returned at 8:30 a.m. on Dec. 11, Alachua County Sheriff's Office spokesman Art Forgey said.

The employee told the Sheriff's Office the only people with keys are security staff and the cleaning crew.

When asked if the thefts were an inside job, AvMed spokeswoman Cochita Ruiz-Topinka said, "We
don't want to jump to any conclusions."

Attempts to locate the laptops have been unsuccessful, and the investigation remains open.

On Dec. 23, AvMed determined that data on one of the laptops might not have been encrypted properly.

It announced the breach in a release dated Feb. 5.

The delay in announcing the breach was to avoid hindering the investigation and to set up identity protection services, the company said.

There are currently no known reports of identity theft, but Ruiz-Topinka said AvMed will have a better idea once members start registering for identity protection.

Potentially at risk are 80,000 current and 128,000 former subscribers dating back to April 2003, as well as their dependents.

Ruiz-Topinka said the information is from various plans, including Medicare members in South Florida and commercial clients throughout the state.

The company began notifying them by mail as early as Monday and has arranged for 24 months of free identity protection. Affected subscribers can register with Debix Identity Protection Network, which can tell callers if their information was potentially exposed. Subscribers can call Debix at 877-263-7998 (TTY 877-442-8633).

AvMed also has implemented additional security procedures and training.

"We will do all we can to work with our members whose personal information may have been compromised and help them work through the process," Ed Hannum, president and chief operating officer, said in a release. "We regret that this incident has occurred, and we are committed to prevent future occurrences."


This article was quoted by permission of the author. It shows the importance of Laptop Security Software in the prevention of identity theft.

Jack Taggerty

Click here to post comments

Join in and write your own page! It's easy to do. How? Simply click here to return to Laptop Security.


IT Governance Limited Disclosure: Identity-Theft-Scout.com is participating in the IT Governance Limited Affiliate  Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to their affiliate platform.

What Can You Write About?

We are looking for content related to cybercrimes and identity theft. There are tens of possible topics you can pick on these subjects. Moreover, we appreciate innovative issues, critical opinions, and solution-based articles on an area related to our main topics.

In addition to the topics below, if you have anything else related to our line of interest, please let us know, and we will be glad to share with our readers.


Possible Broad Areas

  • Malware
  • Laptop hacking
  • Cyberbullying
  • Internet security
  • Identity
  • Phishing
  • Data security
  • Bring Your Own Device
  • Data protection regulations
  • Data recovery
  • Data loss or DDOS mitigation
  • Identity theft recovery … and many more.


Guidelines for Content Contribution

Feel free to send us your submissions or topic ideas through our email address. We strive to respond to every request as fast as we can.

Before working on a topic, please take a look at our guidelines we would like all writers to follow. Please feel free to drop us a line if you do not understand any of the guidelines below or have a suggestion.

  • All articles should be at least a 1000 words long. We believe that long articles expound on the topics at hand better than short ones
  • Articles should be written in English. And must be written following the steps mentioned here.
  • All articles should be original and not copied from the internet even if it is your website. They must pass the Copyscape check before we can publish them.
  • The Articles should have useful and quality content, well written and easy to understand
  • Headlines written following the guidelines mentioned here.
  • The articles should be in an editable format such as .odt, docx or .txt format. Please double space your lines for the ease of reading through
  • No offensive or adult language should be employed
  • Please, check the article using a spell checker tool (like as Grammarly) before sending the copy to us.
  • Please provide a high resolution image for each 250 words (Though, we reserve the right of using the images provided by you). At least 3 images is required for a 1000 words article. The images must be from the free sources (like as Pixabay, Unsplash.com, or Pexels.com). The exact image source link must be provided under each images. 



What Will You Get In Return?

  • We give full credits for your published work
  • If we publish your article, we will give credits to you. Besides, we will write a short bio of you below the article and link to your blog social media pages or website.

We Pay Writers For Exceptional Contributions!

Where a contribution meets our guidelines and is an exceptional idea to help our readers and community we will pay up to AUD50 for the contribution.

Our editorial committee will be the sole judge of what is an exceptional idea. If you have an idea that you wish to pitch to us please use the contact email mentioned in this article. 

For the new freelance writers, it is a great chance to earn money online by writing for our website.

This is to encourage you in freelance writing, blogging, and making money online.


How Do You Submit Your Articles?

Take a look at our published work to help generate unique ideas.

Please check and double check that you’ve fulfilled all the criteria.

Then, send the article to us at john[at]identity-theft-scout.com 

We get several submissions every day. Therefore it may take time for us to go through each submission. Please bear with us. We promise to respond to each request within a few days

We look forward to publishing your next article.


Happy writing!!


Amazon Disclosure: We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.